Blogger Widgets

Labels

Flash Labels by Way2Blogging

Sunday 8 July 2012

Different Types of Viruses in Computer and Malwares

| |

What are the differences between malware, spyware and adware?Is virus a type of malware?
These are some common questions asked by most computer users.
Therefore, I gonna explain the different types of viruses in computer and malicious softwares.  You will be able to understand clearly about the differences between viruses, malware, spyware etc. in this article.
WHAT IS COMPUTER VIRUS?
A program that infects and attacks a computer negatively by interfering the way the computer works without permission of the user(s). Virus can spread from one computer to another by copying itself. Virus is commonly refers to all types of malwares, which is wrong. It is a type of malware and different from worms, trojan horses etc.


WHAT IS MALWARE?
Malware stands for malicious software, which means harmful software that alters the computer’s operation and gain access into a computer system without user’s knowledge. It is a general term that is used to describe all types of harmful and hostile softwares, which includescomputer viruses, worms, trojan horse, rootkit, back doors, spywares, andadwares. Each type of malware works differently and I will cover all of them briefly for you. I will start with computer worm as I have explained what virus is.

1. Computer Worm

A program that replicates itself repeatedly in the computer or on a network. It causes overload of memory or network by using up resources or bandwidth. As a result, the computer might shut down or congests the network. Unlike virus, it does not corrupt and access files in computer.
2. Trojan Horse


A program that hides inside a legitimate program. Usually, when the user runs or installs a program, it will trigger the trojan horse and harms the PC. It does not replicate itself to other computers.
3. Rootkit
A program that hides itself in a PC and allows someone to have administrator-level access of the computer. Once the rootkit is installed, the cracker can change settings, execute programs, monitor activity etc. via network. It is illegal when the rootkit author intrudes the computer without the user’s permission.
4. Back door
Programmers usually build back doors into programs during system development to save time. While testing and writing programs, they can bypass security controls and make changes. However, hackers use this method to access the computer remotely without the user’s knowledge. Back door can be a rootkit. Some worms too leave back doors, which have been used to distribute junk e-mail or spread other worms.
5. Spyware


Software that collects personal identification information via internet without the user’s permission. It often exists as an add-on of a program. In most cases, the user did not read the End User License Agreement (EULA) completely, and hackers take advantage of it. They wrote a few lines about the user’s privacy statement in the EULA. As a result, most users agree to it without reading thus spyware is installed in their system without knowing it.
6. Adware
Stands for advertising-supported software, is a software application that displays advertisements when a program (usually freeware) is running. It can be harmful when an adware collects an user’s personal information to display ads according to the user’s internet surfing habit. Harmful adware is a form of spyware as it invades user’s privacy.
I hope you have understood the differences of each and every malware. This can be useful for you to have some basic knowledge about the definition of virus and types of malicious software in computer

0 comments:

Post a Comment